Zobrazeno 1 - 10
of 73
pro vyhledávání: '"Loukas Lazos"'
Publikováno v:
IEEE Transactions on Mobile Computing. 21:612-628
Many IoT devices lack the necessary interfaces (keyboards, screens) for entering passwords or changing default ones. For these devices, bootstrapping trust can be challenging. We address the problem of device pairing in the absence of any shared secr
Autor:
Loukas Lazos, Yan Zhang
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 17:760-774
Multi-channel MAC (MMAC) protocols are designed to coordinate multi-user access to several non-overlapping frequency bands. They are primarily tasked with the efficient and fair bandwidth utilization under a variety of traffic load conditions, presum
Autor:
Loukas Lazos, Li Li
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 31:1048-1065
Cloud service providers (CSPs) promise to reliably store repositories outsourced by clients. Unfortunately, once files have left the client's control, he has no means to verify their redundant storage. In this article, we develop Proof of Physical Re
Cooperative vehicle platooning significantly improves highway safety, fuel efficiency, and traffic flow. In this model, a set of vehicles move in line formation and coordinate acceleration, braking, and steering using a combination of physical sensin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ef94375f44fdd244061e24e5cc3da709
http://arxiv.org/abs/2107.09863
http://arxiv.org/abs/2107.09863
Publikováno v:
ISIT
In latent-variable private information retrieval (LV-PIR), a user wishes to retrieve one out of $K$ messages (indexed by θ) without revealing any information about a sensitive latent attribute (modeled by a latent variable $S$ correlated with θ). W
Publikováno v:
MobiHoc
Physical-layer based key generation schemes exploit the channel reciprocity for secret key extraction, which can achieve information-theoretic secrecy against eavesdroppers. Such methods, although practical, have been shown to be vulnerable against m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1d618cad74f8fb35272cdc6892ad9fac
http://arxiv.org/abs/2106.02731
http://arxiv.org/abs/2106.02731
Publikováno v:
ICC
Dynamic spectrum access enables opportunistic users (OUs) to access underutilized licensed bands by querying spectrum databases. However, the operational details of the incumbent users may leak to OUs during the query process. Privacy and exclusion z
Publikováno v:
ICC
Motivated by the shared spectrum paradigm, we address the problem of implicit coordination between coexisting wireless systems that do not share a common control plane. We consider the coexistence of LTE and Wi-Fi and study mechanisms for conserving
Publikováno v:
ISIT
In many applications, content accessed by users (movies, videos, news articles, etc.) can leak sensitive latent attributes, such as religious and political views, sexual orientation, ethnicity, gender, and others. To prevent such information leakage,
Information-theoretic formulations of the private information retrieval (PIR) problem have been investigated under a variety of scenarios. Symmetric private information retrieval (SPIR) is a variant where a user is able to privately retrieve one out
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5b39b5c8a89e9dcc980bf445df79734e